Malign coders have created a new version of a tool that dumbs down the process of creating Trojan horse malware.
Shark 2 can be used to create Trojans capable of stealing confidential data, or backdoor programs that can be used to surreptitiously capture images from infected PCs, among other things.
The tool is being …

a**hat

asshat troll I know better than to feed you but the last thing anyone in Linux land wants is more zombie windows boxes because while it slows the interwebs down to a crawl those people are totally unaware anything is wrong and we suffer too we still get the spam our sites still get ddosed and our grannies still have their cc information stolen we may think you should switch none of us think you should be victimised thats kind of the point troll to not let people be victimised and we have to fight crap FUD and corporate swill all the time to try and help it's shit but we never stop it's too important to stop. What this trojan kit basically does is allow one trojan author to distribute his trojan in slightly different ways but the code is good and will cause a lot of grief I hope it can be tracked and the douche arrested soon.

Re: Alan Donaly

Re: Alan Donaly

So,

How would you ensure you'd gotten your hacking toolkit from a 'trusted' source? As opposed to dealing with someone who turns out to be in law enforcement, or perhaps someone who has carefully tweaked it to add backdoors to all the little trojans it produces? I would be in no hurry to go and buy a copy.

Perhaps it already hacks the hackers

I sure wouldnt trust a tool to write trojans to not have any already included in it and lets be honest if I needed this tool to write stuff then I probably wouldnt know enough to check if it was infected.

Personally I think it would be fitting justice if in the attempt to infect others they got infected themselves